mandatoryprogrammer / CursedChrome
Chrome-extension implant that turns victim Chrome browsers into fully-functional HTTP proxies, allowing you to browse sites as your victims.
☆1,539Updated 6 months ago
Alternatives and similar repositories for CursedChrome
Users that are interested in CursedChrome are comparing it to the libraries listed below
Sorting:
- A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux☆1,362Updated 4 years ago
- Muraena is an almost-transparent reverse proxy aimed at automating phishing and post-phishing activities.☆977Updated 6 months ago
- A private botnet using multiple cloud environments for pentesters and red teamers. - Built by the community during a hackathon at the WWH…☆624Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,095Updated 3 years ago
- Data exfiltration over DNS request covert channel☆867Updated last year
- pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and …☆1,861Updated 2 years ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,504Updated last year
- A mostly-serverless distributed hash cracking platform☆806Updated last year
- A DNS rebinding attack framework.☆1,098Updated last week
- DeimosC2 is a Golang command and control framework for post-exploitation.☆1,118Updated 3 weeks ago
- TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.☆1,278Updated 3 years ago
- Reverse Tunneling made easy for pentesters, by pentesters https://sysdream.com/☆1,764Updated 2 years ago
- 🐧 Abuse of Google Colab for cracking hashes.☆948Updated last year
- Convolutional neural network for analyzing pentest screenshots☆1,195Updated last year
- Mass scan IPs for vulnerable services☆1,031Updated 3 years ago
- AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation☆2,046Updated 2 years ago
- DNS covert channel implant for Red Teams.☆734Updated 5 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆1,734Updated 3 months ago
- pwning IPv4 via IPv6☆1,786Updated last year
- Mimikatz implementation in pure Python☆3,006Updated 2 months ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,611Updated 2 years ago
- IP lookup by favicon using Shodan☆1,164Updated 3 months ago
- Privilege Escalation Project - Windows / Linux / Mac☆2,532Updated 7 months ago
- Phantom Tap (PhanTap) - an ‘invisible’ network tap aimed at red teams☆602Updated 11 months ago
- ScareCrow - Payload creation framework designed around EDR bypass.☆2,813Updated last year
- Gives you one-liners that aids in penetration testing operations, privilege escalation and more☆1,710Updated 7 months ago
- Extract credentials from lsass remotely☆2,111Updated 2 weeks ago
- Sandbox evasion modules written in PowerShell, Python, Go, Ruby, C, C#, Perl, and Rust.☆919Updated 3 years ago
- Pop shells like a master.☆1,461Updated 6 years ago
- Subdomain Takeover tool written in Go☆1,969Updated last year